8 research outputs found
A Framework for Semi-automated Web Service Composition in Semantic Web
Number of web services available on Internet and its usage are increasing
very fast. In many cases, one service is not enough to complete the business
requirement; composition of web services is carried out. Autonomous composition
of web services to achieve new functionality is generating considerable
attention in semantic web domain. Development time and effort for new
applications can be reduced with service composition. Various approaches to
carry out automated composition of web services are discussed in literature.
Web service composition using ontologies is one of the effective approaches. In
this paper we demonstrate how the ontology based composition can be made faster
for each customer. We propose a framework to provide precomposed web services
to fulfil user requirements. We detail how ontology merging can be used for
composition which expedites the whole process. We discuss how framework
provides customer specific ontology merging and repository. We also elaborate
on how merging of ontologies is carried out.Comment: 6 pages, 9 figures; CUBE 2013 International Conferenc
Reverse Proxy Framework using Sanitization Technique for Intrusion Prevention in Database
With the increasing importance of the internet in our day to day life, data
security in web application has become very crucial. Ever increasing on line
and real time transaction services have led to manifold rise in the problems
associated with the database security. Attacker uses illegal and unauthorized
approaches to hijack the confidential information like username, password and
other vital details. Hence the real time transaction requires security against
web based attacks. SQL injection and cross site scripting attack are the most
common application layer attack. The SQL injection attacker pass SQL statement
through a web applications input fields, URL or hidden parameters and get
access to the database or update it. The attacker take a benefit from user
provided data in such a way that the users input is handled as a SQL code.
Using this vulnerability an attacker can execute SQL commands directly on the
database. SQL injection attacks are most serious threats which take users input
and integrate it into SQL query. Reverse Proxy is a technique which is used to
sanitize the users inputs that may transform into a database attack. In this
technique a data redirector program redirects the users input to the proxy
server before it is sent to the application server. At the proxy server, data
cleaning algorithm is triggered using a sanitizing application. In this
framework we include detection and sanitization of the tainted information
being sent to the database and innovate a new prototype.Comment: 9 pages, 6 figures, 3 tables; CIIT 2013 International Conference,
Mumba
Image Registration based on Support Vector Machine for Tampering Localization
Different technologies are available on web. In the era of internet communication, systems should able to protect content such as pictures, videos against malicious modifications during their transmission. One of the important problems addressed in this is the authentication of the image received in a Communication. Tampering detection has significance in authentication of image. This paper presents support vector machine (SVM) based tampering detection system. In this a robust alignment (registration) method is proposed which makes use of an image hash component based on the Bag of Features (BOF) paradigm to localize the tampering. These BOF are clustered for effective image alignment. The support vector machine is optimal partitioning based linear classifier and at least theoretically better other classifier because only small numbers of classes required during classification SVM. The proposed signature is attached to the image before transmission and then analyzed at destination to recover the geometric transformations which have been applied to the received image. A block-wise tampering detection which uses histograms of oriented gradients (HOG) presentation is proposed. The proposed approach obtains better margin in providing an overall enhanced performance by reducing the training time while maintaining the accuracy
Natural pigment betacyanin as tracking dye for gel electrophoresis
Several dyes including bromophenol blue are used as tracking dye in gel electrophoresis. The stability of betacyanin extracted from spinach vine fruit (Basella rubra L.) was studied in relation to degradative factors such as pH ranging from 2 to 12 and at 100ºC. Betacyanin pigment was found to be stable at pH range 3-8 while the stability of the pigment at high temperature was found to be moderate. The effectiveness of betacyanin as a tracking dye was checked along with the bromophenol blue for agarose gel electrophoresis. The present study revealed that betacyanin from spinach fruit can be a potential alternative to conventional dye like bromophenol blue used in the loading dye preparation for agarose gel electrophoresis
Natural pigment betacyanin as tracking dye for gel electrophoresis
23-26Several
dyes including bromophenol
blue are used as tracking dye in gel electrophoresis. The<span style="mso-ansi-language:
EN-IN;mso-fareast-language:EN-IN"> stability of betacyanin extracted from
spinach vine fruit (Basella rubra L.) was studied in relation to
degradative factors such as pH ranging from 2 to 12 and at 100ºC. Betacyanin
pigment was found to be stable at pH range 3-8 while the stability of the
pigment at high temperature was found to be moderate. The effectiveness of betacyanin as a
tracking dye was checked along with the bromophenol blue for agarose gel
electrophoresis. The present study revealed that betacyanin from spinach fruit
can be a potential
alternative to conventional dye like bromophenol blue used in the loading dye
preparation for agarose gel electrophoresis.
</span